„Memory Attacks“
Suchergebnisse
1.000+ Treffer
-
LSTM-FFAM: utilization of long-short term memory recurrent neural network with feed forward attention mechanism for detection of replay attacks in wireless sensor networks
-
Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
-
Investigation of sensitivity of different logic and memory cells to Laser Fault Injections
-
Forensic Data Extraction from Modern File Systems
-
Detecting Peripheral-based Attacks on the Host Memory
-
9/11 als Netzereignis. Zur Formation von Erinnerungskultur und Mediengedächtnis im World Wide Web
-
Detecting peripheral-based attacks on the host memory
-
Research in Attacks, Intrusions, and Defenses – 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings
-
Smart Card Research and Advanced Applications – 10th IFIP WG 8.8/11.2 International Conference, CARDIS 2011, Leuven, Belgium, September 14-16, 2011, Revised Selected Papers
-
Yataglass – Network-level Code Emulation for Analyzing Memory-scanning Attacks
-
Robust LFSR-based scrambling to mitigate stencil attack on main memory
-
9/11 in European Literature – Negotiating Identities Against the Attacks and What Followed
-
Higher-order lookup table masking in essentially constant memory
-
Memory-Efficient Attacks on Small LWE Keys
-
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
-
MEAS: memory encryption and authentication secure against side-channel attacks
-
Observer-based adaptive memory event-triggered consensus tracking control for high-speed train under DoS attacks
-
A new approach for detecting process injection attacks using memory analysis
-
Detection and mitigation of time synchronization attacks based on long short-term memory neural network
-
Working memory during spontaneous migraine attacks: an fMRI study